-
NMGrad: Advancing Histopathological Bladder Cancer Grading with Weakly Supervised Deep Learning
Authors:
Saul Fuster,
Umay Kiraz,
Trygve Eftestøl,
Emiel A. M. Janssen,
Kjersti Engan
Abstract:
The most prevalent form of bladder cancer is urothelial carcinoma, characterized by a high recurrence rate and substantial lifetime treatment costs for patients. Grading is a prime factor for patient risk stratification, although it suffers from inconsistencies and variations among pathologists. Moreover, absence of annotations in medical imaging difficults training deep learning models. To addres…
▽ More
The most prevalent form of bladder cancer is urothelial carcinoma, characterized by a high recurrence rate and substantial lifetime treatment costs for patients. Grading is a prime factor for patient risk stratification, although it suffers from inconsistencies and variations among pathologists. Moreover, absence of annotations in medical imaging difficults training deep learning models. To address these challenges, we introduce a pipeline designed for bladder cancer grading using histological slides. First, it extracts urothelium tissue tiles at different magnification levels, employing a convolutional neural network for processing for feature extraction. Then, it engages in the slide-level prediction process. It employs a nested multiple instance learning approach with attention to predict the grade. To distinguish different levels of malignancy within specific regions of the slide, we include the origins of the tiles in our analysis. The attention scores at region level is shown to correlate with verified high-grade regions, giving some explainability to the model. Clinical evaluations demonstrate that our model consistently outperforms previous state-of-the-art methods.
△ Less
Submitted 24 May, 2024;
originally announced May 2024.
-
Self-Contrastive Weakly Supervised Learning Framework for Prognostic Prediction Using Whole Slide Images
Authors:
Saul Fuster,
Farbod Khoraminia,
Julio Silva-Rodríguez,
Umay Kiraz,
Geert J. L. H. van Leenders,
Trygve Eftestøl,
Valery Naranjo,
Emiel A. M. Janssen,
Tahlita C. M. Zuiverloon,
Kjersti Engan
Abstract:
We present a pioneering investigation into the application of deep learning techniques to analyze histopathological images for addressing the substantial challenge of automated prognostic prediction. Prognostic prediction poses a unique challenge as the ground truth labels are inherently weak, and the model must anticipate future events that are not directly observable in the image. To address thi…
▽ More
We present a pioneering investigation into the application of deep learning techniques to analyze histopathological images for addressing the substantial challenge of automated prognostic prediction. Prognostic prediction poses a unique challenge as the ground truth labels are inherently weak, and the model must anticipate future events that are not directly observable in the image. To address this challenge, we propose a novel three-part framework comprising of a convolutional network based tissue segmentation algorithm for region of interest delineation, a contrastive learning module for feature extraction, and a nested multiple instance learning classification module. Our study explores the significance of various regions of interest within the histopathological slides and exploits diverse learning scenarios. The pipeline is initially validated on artificially generated data and a simpler diagnostic task. Transitioning to prognostic prediction, tasks become more challenging. Employing bladder cancer as use case, our best models yield an AUC of 0.721 and 0.678 for recurrence and treatment outcome prediction respectively.
△ Less
Submitted 24 May, 2024;
originally announced May 2024.
-
Equip** Computational Pathology Systems with Artifact Processing Pipelines: A Showcase for Computation and Performance Trade-offs
Authors:
Neel Kanwal,
Farbod Khoraminia,
Umay Kiraz,
Andres Mosquera-Zamudio,
Carlos Monteagudo,
Emiel A. M. Janssen,
Tahlita C. M. Zuiverloon,
Chunmig Rong,
Kjersti Engan
Abstract:
Histopathology is a gold standard for cancer diagnosis under a microscopic examination. However, histological tissue processing procedures result in artifacts, which are ultimately transferred to the digitized version of glass slides, known as whole slide images (WSIs). Artifacts are diagnostically irrelevant areas and may result in wrong deep learning (DL) algorithms predictions. Therefore, detec…
▽ More
Histopathology is a gold standard for cancer diagnosis under a microscopic examination. However, histological tissue processing procedures result in artifacts, which are ultimately transferred to the digitized version of glass slides, known as whole slide images (WSIs). Artifacts are diagnostically irrelevant areas and may result in wrong deep learning (DL) algorithms predictions. Therefore, detecting and excluding artifacts in the computational pathology (CPATH) system is essential for reliable automated diagnosis. In this paper, we propose a mixture of experts (MoE) scheme for detecting five notable artifacts, including damaged tissue, blur, folded tissue, air bubbles, and histologically irrelevant blood from WSIs. First, we train independent binary DL models as experts to capture particular artifact morphology. Then, we ensemble their predictions using a fusion mechanism. We apply probabilistic thresholding over the final probability distribution to improve the sensitivity of the MoE. We developed DL pipelines using two MoEs and two multiclass models of state-of-the-art deep convolutional neural networks (DCNNs) and vision transformers (ViTs). DCNNs-based MoE and ViTs-based MoE schemes outperformed simpler multiclass models and were tested on datasets from different hospitals and cancer types, where MoE using DCNNs yielded the best results. The proposed MoE yields 86.15% F1 and 97.93% sensitivity scores on unseen data, retaining less computational cost for inference than MoE using ViTs. This best performance of MoEs comes with relatively higher computational trade-offs than multiclass models. The proposed artifact detection pipeline will not only ensure reliable CPATH predictions but may also provide quality control.
△ Less
Submitted 23 May, 2024; v1 submitted 12 March, 2024;
originally announced March 2024.
-
Analyzing and Mitigating Bias for Vulnerable Classes: Towards Balanced Representation in Dataset
Authors:
Dewant Katare,
David Solans Noguero,
Souneil Park,
Nicolas Kourtellis,
Marijn Janssen,
Aaron Yi Ding
Abstract:
The accuracy and fairness of perception systems in autonomous driving are essential, especially for vulnerable road users such as cyclists, pedestrians, and motorcyclists who face significant risks in urban driving environments. While mainstream research primarily enhances class performance metrics, the hidden traits of bias inheritance in the AI models, class imbalances and disparities within the…
▽ More
The accuracy and fairness of perception systems in autonomous driving are essential, especially for vulnerable road users such as cyclists, pedestrians, and motorcyclists who face significant risks in urban driving environments. While mainstream research primarily enhances class performance metrics, the hidden traits of bias inheritance in the AI models, class imbalances and disparities within the datasets are often overlooked. Our research addresses these issues by investigating class imbalances among vulnerable road users, with a focus on analyzing class distribution, evaluating performance, and assessing bias impact. Utilizing popular CNN models and Vision Transformers (ViTs) with the nuScenes dataset, our performance evaluation indicates detection disparities for underrepresented classes. Compared to related work, we focus on metric-specific and Cost-Sensitive learning for model optimization and bias mitigation, which includes data augmentation and resampling. Using the proposed mitigation approaches, we see improvement in IoU(\%) and NDS(\%) metrics from 71.3 to 75.6 and 80.6 to 83.7 for the CNN model. Similarly, for ViT, we observe improvement in IoU and NDS metrics from 74.9 to 79.2 and 83.8 to 87.1. This research contributes to develo** reliable models while enhancing inclusiveness for minority classes in datasets.
△ Less
Submitted 12 May, 2024; v1 submitted 18 January, 2024;
originally announced January 2024.
-
A Dual Convolutional Neural Network Pipeline for Melanoma Diagnostics and Prognostics
Authors:
Marie Bø-Sande,
Edvin Benjaminsen,
Neel Kanwal,
Saul Fuster,
Helga Hardardottir,
Ingrid Lundal,
Emiel A. M. Janssen,
Kjersti Engan
Abstract:
Melanoma is a type of cancer that begins in the cells controlling the pigment of the skin, and it is often referred to as the most dangerous skin cancer. Diagnosing melanoma can be time-consuming, and a recent increase in melanoma incidents indicates a growing demand for a more efficient diagnostic process. This paper presents a pipeline for melanoma diagnostics, leveraging two convolutional neura…
▽ More
Melanoma is a type of cancer that begins in the cells controlling the pigment of the skin, and it is often referred to as the most dangerous skin cancer. Diagnosing melanoma can be time-consuming, and a recent increase in melanoma incidents indicates a growing demand for a more efficient diagnostic process. This paper presents a pipeline for melanoma diagnostics, leveraging two convolutional neural networks, a diagnosis, and a prognosis model. The diagnostic model is responsible for localizing malignant patches across whole slide images and delivering a patient-level diagnosis as malignant or benign. Further, the prognosis model utilizes the diagnostic model's output to provide a patient-level prognosis as good or bad. The full pipeline has an F1 score of 0.79 when tested on data from the same distribution as it was trained on.
△ Less
Submitted 14 December, 2023;
originally announced December 2023.
-
Supporting UAVs with Edge Computing: A Review of Opportunities and Challenges
Authors:
Malte Janßen,
Tobias Pfandzelter,
Minghe Wang,
David Bermbach
Abstract:
Over the last years, Unmanned Aerial Vehicles (UAVs) have seen significant advancements in sensor capabilities and computational abilities, allowing for efficient autonomous navigation and visual tracking applications. However, the demand for computationally complex tasks has increased faster than advances in battery technology. This opens up possibilities for improvements using edge computing. In…
▽ More
Over the last years, Unmanned Aerial Vehicles (UAVs) have seen significant advancements in sensor capabilities and computational abilities, allowing for efficient autonomous navigation and visual tracking applications. However, the demand for computationally complex tasks has increased faster than advances in battery technology. This opens up possibilities for improvements using edge computing. In edge computing, edge servers can achieve lower latency responses compared to traditional cloud servers through strategic geographic deployments. Furthermore, these servers can maintain superior computational performance compared to UAVs, as they are not limited by battery constraints. Combining these technologies by aiding UAVs with edge servers, research finds measurable improvements in task completion speed, energy efficiency, and reliability across multiple applications and industries. This systematic literature review aims to analyze the current state of research and collect, select, and extract the key areas where UAV activities can be supported and improved through edge computing.
△ Less
Submitted 18 October, 2023;
originally announced October 2023.
-
Balancing Privacy and Progress in Artificial Intelligence: Anonymization in Histopathology for Biomedical Research and Education
Authors:
Neel Kanwal,
Emiel A. M. Janssen,
Kjersti Engan
Abstract:
The advancement of biomedical research heavily relies on access to large amounts of medical data. In the case of histopathology, Whole Slide Images (WSI) and clinicopathological information are valuable for develo** Artificial Intelligence (AI) algorithms for Digital Pathology (DP). Transferring medical data "as open as possible" enhances the usability of the data for secondary purposes but pose…
▽ More
The advancement of biomedical research heavily relies on access to large amounts of medical data. In the case of histopathology, Whole Slide Images (WSI) and clinicopathological information are valuable for develo** Artificial Intelligence (AI) algorithms for Digital Pathology (DP). Transferring medical data "as open as possible" enhances the usability of the data for secondary purposes but poses a risk to patient privacy. At the same time, existing regulations push towards kee** medical data "as closed as necessary" to avoid re-identification risks. Generally, these legal regulations require the removal of sensitive data but do not consider the possibility of data linkage attacks due to modern image-matching algorithms. In addition, the lack of standardization in DP makes it harder to establish a single solution for all formats of WSIs. These challenges raise problems for bio-informatics researchers in balancing privacy and progress while develo** AI algorithms. This paper explores the legal regulations and terminologies for medical data-sharing. We review existing approaches and highlight challenges from the histopathological perspective. We also present a data-sharing guideline for histological data to foster multidisciplinary research and education.
△ Less
Submitted 8 August, 2023; v1 submitted 18 July, 2023;
originally announced July 2023.
-
A Survey on Approximate Edge AI for Energy Efficient Autonomous Driving Services
Authors:
Dewant Katare,
Diego Perino,
Jari Nurmi,
Martijn Warnier,
Marijn Janssen,
Aaron Yi Ding
Abstract:
Autonomous driving services rely heavily on sensors such as cameras, LiDAR, radar, and communication modules. A common practice of processing the sensed data is using a high-performance computing unit placed inside the vehicle, which deploys AI models and algorithms to act as the brain or administrator of the vehicle. The vehicular data generated from average hours of driving can be up to 20 Terab…
▽ More
Autonomous driving services rely heavily on sensors such as cameras, LiDAR, radar, and communication modules. A common practice of processing the sensed data is using a high-performance computing unit placed inside the vehicle, which deploys AI models and algorithms to act as the brain or administrator of the vehicle. The vehicular data generated from average hours of driving can be up to 20 Terabytes depending on the data rate and specification of the sensors. Given the scale and fast growth of services for autonomous driving, it is essential to improve the overall energy and environmental efficiency, especially in the trend towards vehicular electrification (e.g., battery-powered). Although the areas have seen significant advancements in sensor technologies, wireless communications, computing and AI/ML algorithms, the challenge still exists in how to apply and integrate those technology innovations to achieve energy efficiency. This survey reviews and compares the connected vehicular applications, vehicular communications, approximation and Edge AI techniques. The focus is on energy efficiency by covering newly proposed approximation and enabling frameworks. To the best of our knowledge, this survey is the first to review the latest approximate Edge AI frameworks and publicly available datasets in energy-efficient autonomous driving. The insights and vision from this survey can be beneficial for the collaborative driving service development on low-power and memory-constrained systems and also for the energy optimization of autonomous vehicles.
△ Less
Submitted 13 April, 2023;
originally announced April 2023.
-
Deep Learning for Predicting Metastasis on Melanoma WSIs
Authors:
Christopher Andreassen,
Saul Fuster,
Helga Hardardottir,
Emiel A. M. Janssen,
Kjersti Engan
Abstract:
Northern Europe has the second highest mortality rate of melanoma globally. In 2020, the mortality rate of melanoma rose to 1.9 per 100 000 habitants. Melanoma prognosis is based on a pathologist's subjective visual analysis of the patient's tumor. This methodology is heavily time-consuming, and the prognosis variability among experts is notable, drastically jeopardizing its reproducibility. Thus,…
▽ More
Northern Europe has the second highest mortality rate of melanoma globally. In 2020, the mortality rate of melanoma rose to 1.9 per 100 000 habitants. Melanoma prognosis is based on a pathologist's subjective visual analysis of the patient's tumor. This methodology is heavily time-consuming, and the prognosis variability among experts is notable, drastically jeopardizing its reproducibility. Thus, the need for faster and more reproducible methods arises. Machine learning has paved its way into digital pathology, but so far, most contributions are on localization, segmentation, and diagnostics, with little emphasis on prognostics. This paper presents a convolutional neural network (CNN) method based on VGG16 to predict melanoma prognosis as the presence of metastasis within five years. Patches are extracted from regions of interest from Whole Slide Images (WSIs) at different magnification levels used in model training and validation. Results infer that utilizing WSI patches at 20x magnification level has the best performance, with an F1 score of 0.7667 and an AUC of 0.81.
△ Less
Submitted 10 March, 2023;
originally announced March 2023.
-
Detection and Localization of Melanoma Skin Cancer in Histopathological Whole Slide Images
Authors:
Neel Kanwal,
Roger Amundsen,
Helga Hardardottir,
Luca Tomasetti,
Erling Sandoy Undersrud,
Emiel A. M. Janssen,
Kjersti Engan
Abstract:
Melanoma diagnosed and treated in its early stages can increase the survival rate. A projected increase in skin cancer incidents and a dearth of dermatopathologists have emphasized the need for computational pathology (CPATH) systems. CPATH systems with deep learning (DL) models have the potential to identify the presence of melanoma by exploiting underlying morphological and cellular features. Th…
▽ More
Melanoma diagnosed and treated in its early stages can increase the survival rate. A projected increase in skin cancer incidents and a dearth of dermatopathologists have emphasized the need for computational pathology (CPATH) systems. CPATH systems with deep learning (DL) models have the potential to identify the presence of melanoma by exploiting underlying morphological and cellular features. This paper proposes a DL method to detect melanoma and distinguish between normal skin and benign/malignant melanocytic lesions in Whole Slide Images (WSI). Our method detects lesions with high accuracy and localizes them on a WSI to identify potential regions of interest for pathologists. Interestingly, our DL method relies on using a single CNN network to create localization maps first and use them to perform slide-level predictions to determine patients who have melanoma. Our best model provides favorable patch-wise classification results with a 0.992 F1 score and 0.99 sensitivity on unseen data. The source code is https://github.com/RogerAmundsen/Melanoma-Diagnosis-and-Localization-from-Whole-Slide-Images-using-Convolutional-Neural-Networks.
△ Less
Submitted 4 November, 2023; v1 submitted 6 February, 2023;
originally announced February 2023.
-
Human Factors in Security Research: Lessons Learned from 2008-2018
Authors:
Mannat Kaur,
Michel van Eeten,
Marijn Janssen,
Kevin Borgolte,
Tobias Fiebig
Abstract:
Instead of only considering technology, computer security research now strives to also take into account the human factor by studying regular users and, to a lesser extent, experts like operators and developers of systems. We focus our analysis on the research on the crucial population of experts, whose human errors can impact many systems at once, and compare it to research on regular users. To u…
▽ More
Instead of only considering technology, computer security research now strives to also take into account the human factor by studying regular users and, to a lesser extent, experts like operators and developers of systems. We focus our analysis on the research on the crucial population of experts, whose human errors can impact many systems at once, and compare it to research on regular users. To understand how far we advanced in the area of human factors, how the field can further mature, and to provide a point of reference for researchers new to this field, we analyzed the past decade of human factors research in security and privacy, identifying 557 relevant publications. Of these, we found 48 publications focused on expert users and analyzed all in depth. For additional insights, we compare them to a stratified sample of 48 end-user studies.
In this paper we investigate:
(i) The perspective on human factors, and how we can learn from safety science (ii) How and who are the participants recruited, and how this -- as we find -- creates a western-centric perspective (iii) Research objectives, and how to align these with the chosen research methods (iv) How theories can be used to increase rigor in the communities scientific work, including limitations to the use of Grounded Theory, which is often incompletely applied (v) How researchers handle ethical implications, and what we can do to account for them more consistently
Although our literature review has limitations, new insights were revealed and avenues for further research identified.
△ Less
Submitted 24 March, 2021;
originally announced March 2021.
-
Time Delay Estimation from Multiband Radio Channel Samples in Nonuniform Noise
Authors:
Tarik Kazaz,
Gerard J. M. Janssen,
Alle-Jan van der Veen
Abstract:
The multipath radio channel is considered to have a non-bandlimited channel impulse response. Therefore, it is challenging to achieve high resolution time-delay (TD) estimation of multipath components (MPCs) from bandlimited observations of communication signals. It this paper, we consider the problem of multiband channel sampling and TD estimation of MPCs. We assume that the nonideal multibranch…
▽ More
The multipath radio channel is considered to have a non-bandlimited channel impulse response. Therefore, it is challenging to achieve high resolution time-delay (TD) estimation of multipath components (MPCs) from bandlimited observations of communication signals. It this paper, we consider the problem of multiband channel sampling and TD estimation of MPCs. We assume that the nonideal multibranch receiver is used for multiband sampling, where the noise is nonuniform across the receiver branches. The resulting data model of Hankel matrices formed from acquired samples has multiple shift-invariance structures, and we propose an algorithm for TD estimation using weighted subspace fitting. The subspace fitting is formulated as a separable nonlinear least squares (NLS) problem, and it is solved using a variable projection method. The proposed algorithm supports high resolution TD estimation from an arbitrary number of bands, and it allows for nonuniform noise across the bands. Numerical simulations show that the algorithm almost attains the Cramer Rao Lower Bound, and it outperforms previously proposed methods such as multiresolution TOA, MI-MUSIC, and ESPRIT.
△ Less
Submitted 10 December, 2019;
originally announced December 2019.
-
Ethical Hacking for IoT Security: A First Look into Bug Bounty Programs and Responsible Disclosure
Authors:
Aaron Yi Ding,
Gianluca Limon De Jesus,
Marijn Janssen
Abstract:
The security of the Internet of Things (IoT) has attracted much attention due to the growing number of IoT-oriented security incidents. IoT hardware and software security vulnerabilities are exploited affecting many companies and persons. Since the causes of vulnerabilities go beyond pure technical measures, there is a pressing demand nowadays to demystify IoT "security complex" and develop practi…
▽ More
The security of the Internet of Things (IoT) has attracted much attention due to the growing number of IoT-oriented security incidents. IoT hardware and software security vulnerabilities are exploited affecting many companies and persons. Since the causes of vulnerabilities go beyond pure technical measures, there is a pressing demand nowadays to demystify IoT "security complex" and develop practical guidelines for both companies, consumers, and regulators. In this paper, we present an initial study targeting an unexplored sphere in IoT by illuminating the potential of crowdsource ethical hacking approaches for enhancing IoT vulnerability management. We focus on Bug Bounty Programs (BBP) and Responsible Disclosure (RD), which stimulate hackers to report vulnerability in exchange for monetary rewards. We carried out a qualitative investigation supported by literature survey and expert interviews to explore how BBP and RD can facilitate the practice of identifying, classifying, prioritizing, remediating, and mitigating IoT vulnerabilities in an effective and cost-efficient manner. Besides deriving tangible guidelines for IoT stakeholders, our study also sheds light on a systematic integration path to combine BBP and RD with existing security practices (e.g., penetration test) to further boost overall IoT security.
△ Less
Submitted 24 September, 2019;
originally announced September 2019.
-
Multiresolution time-of-arrival estimation from multiband radio channel measurements
Authors:
Tarik Kazaz,
Raj Thilak Rajan,
Gerard J. M. Janssen,
Alle-Jan van der Veen
Abstract:
Achieving high resolution time-of-arrival (TOA) estimation in multipath propagation scenarios from bandlimited observations of communication signals is challenging because the multipath channel impulse response (CIR) is not bandlimited. Modeling the CIR as a sparse sequence of Diracs, TOA estimation becomes a problem of parametric spectral inference from observed bandlimited signals. To increase r…
▽ More
Achieving high resolution time-of-arrival (TOA) estimation in multipath propagation scenarios from bandlimited observations of communication signals is challenging because the multipath channel impulse response (CIR) is not bandlimited. Modeling the CIR as a sparse sequence of Diracs, TOA estimation becomes a problem of parametric spectral inference from observed bandlimited signals. To increase resolution without arriving at unrealistic sampling rates, we consider multiband sampling approach, and propose a practical multibranch receiver for the acquisition. The resulting data model exhibits multiple shift invariance structures, and we propose a corresponding multiresolution TOA estimation algorithm based on the ESPRIT algorithm. The performance of the algorithm is compared against the derived Cramér Rao Lower Bound, using simulations with standardized ultra-wideband (UWB) channel models. We show that the proposed approach provides high-resolution estimates while reducing spectral occupancy and sampling costs compared to traditional UWB approaches.
△ Less
Submitted 18 April, 2019;
originally announced April 2019.
-
Joint Ranging and Clock Synchronization for Dense Heterogeneous IoT Networks
Authors:
Tarik Kazaz,
Mario Coutino,
Gerard J. M. Janssen,
Geert Leus,
Alle-Jan van der Veen
Abstract:
Synchronization and ranging in internet of things (IoT) networks are challenging due to the narrowband nature of signals used for communication between IoT nodes. Recently, several estimators for range estimation using phase difference of arrival (PDoA) measurements of narrowband signals have been proposed. However, these estimators are based on data models which do not consider the impact of cloc…
▽ More
Synchronization and ranging in internet of things (IoT) networks are challenging due to the narrowband nature of signals used for communication between IoT nodes. Recently, several estimators for range estimation using phase difference of arrival (PDoA) measurements of narrowband signals have been proposed. However, these estimators are based on data models which do not consider the impact of clock-skew on the range estimation. In this paper, clock-skew and range estimation are studied under a unified framework. We derive a novel and precise data model for PDoA measurements which incorporates the unknown clock-skew effects. We then formulate joint estimation of the clock-skew and range as a two-dimensional (2-D) frequency estimation problem of a single complex sinusoid. Furthermore, we propose: (i) a two-way communication protocol for collecting PDoA measurements and (ii) a weighted least squares (WLS) algorithm for joint estimation of clock-skew and range leveraging the shift invariance property of the measurement data. Finally, through numerical experiments, the performance of the proposed protocol and estimator is compared against the Cramer Rao lower bound demonstrating that the proposed estimator is asymptotically efficient.
△ Less
Submitted 4 December, 2018;
originally announced December 2018.
-
5G Applications: Requirements, Challenges, and Outlook
Authors:
Aaron Yi Ding,
Marijn Janssen
Abstract:
The increasing demand for mobile network capacity driven by Internet of Things (IoT) applications results in the need for understanding better the potential and limitations of 5G networks. Vertical application areas like smart mobility, energy networks, industrial IoT applications, and AR/VR enhanced services all pose different requirements on the use of 5G networks. Some applications need low lat…
▽ More
The increasing demand for mobile network capacity driven by Internet of Things (IoT) applications results in the need for understanding better the potential and limitations of 5G networks. Vertical application areas like smart mobility, energy networks, industrial IoT applications, and AR/VR enhanced services all pose different requirements on the use of 5G networks. Some applications need low latency, whereas others need high bandwidth or security support. The goal of this paper is to identify the requirements and to understand the limitations for 5G driven applications. We review application areas and list the typical challenges and requirements posed on 5G networks. A main challenge will be to develop a network architecture being able to dynamically adapt to fluctuating traffic patterns and accommodating various technologies such as edge computing, blockchain based distributed ledger, software defined networking, and virtualization. To inspire future research, we reveal open problems and highlight the need for piloting with 5G applications, with tangible steps, to understand the configuration of 5G networks and the use of applications across multiple vertical industries.
△ Less
Submitted 14 October, 2018;
originally announced October 2018.
-
Design and Processing of Invertible Orientation Scores of 3D Images for Enhancement of Complex Vasculature
Authors:
M. H. J. Janssen,
A. J. E. M. Janssen,
E. J. Bekkers,
J. Olivan Bescos,
R. Duits
Abstract:
The enhancement and detection of elongated structures in noisy image data is relevant for many biomedical imaging applications. To handle complex crossing structures in 2D images, 2D orientation scores $U: \mathbb{R} ^ 2\times S ^ 1 \rightarrow \mathbb{C}$ were introduced, which already showed their use in a variety of applications. Here we extend this work to 3D orientation scores…
▽ More
The enhancement and detection of elongated structures in noisy image data is relevant for many biomedical imaging applications. To handle complex crossing structures in 2D images, 2D orientation scores $U: \mathbb{R} ^ 2\times S ^ 1 \rightarrow \mathbb{C}$ were introduced, which already showed their use in a variety of applications. Here we extend this work to 3D orientation scores $U: \mathbb{R} ^ 3 \times S ^ 2\rightarrow \mathbb{C}$. First, we construct the orientation score from a given dataset, which is achieved by an invertible coherent state type of transform. For this transformation we introduce 3D versions of the 2D cake-wavelets, which are complex wavelets that can simultaneously detect oriented structures and oriented edges. Here we introduce two types of cake-wavelets, the first uses a discrete Fourier transform, the second is designed in the 3D generalized Zernike basis, allowing us to calculate analytical expressions for the spatial filters. Finally, we show two applications of the orientation score transformation. In the first application we propose an extension of crossing-preserving coherence enhancing diffusion via our invertible orientation scores of 3D images which we apply to real medical image data. In the second one we develop a new tubularity measure using 3D orientation scores and apply the tubularity measure to both artificial and real medical data.
△ Less
Submitted 27 November, 2017; v1 submitted 7 July, 2017;
originally announced July 2017.
-
Clustering Spectrum of scale-free networks
Authors:
Clara Stegehuis,
Remco van der Hofstad,
Johan S. H. van Leeuwaarden,
A. J. E. M Janssen
Abstract:
Real-world networks often have power-law degrees and scale-free properties such as ultra-small distances and ultra-fast information spreading. In this paper, we study a third universal property: three-point correlations that suppress the creation of triangles and signal the presence of hierarchy. We quantify this property in terms of $\bar c(k)$, the probability that two neighbors of a degree-$k$…
▽ More
Real-world networks often have power-law degrees and scale-free properties such as ultra-small distances and ultra-fast information spreading. In this paper, we study a third universal property: three-point correlations that suppress the creation of triangles and signal the presence of hierarchy. We quantify this property in terms of $\bar c(k)$, the probability that two neighbors of a degree-$k$ node are neighbors themselves. We investigate how the clustering spectrum $k\mapsto\bar c(k)$ scales with $k$ in the hidden variable model and show that $c(k)$ follows a {\it universal curve} that consists of three $k$-ranges where $\bar c(k)$ remains flat, starts declining, and eventually settles on a power law $\bar c(k)\sim k^{-α}$ with $α$ depending on the power law of the degree distribution. We test these results against ten contemporary real-world networks and explain analytically why the universal curve properties only reveal themselves in large networks.
△ Less
Submitted 5 October, 2017; v1 submitted 6 June, 2017;
originally announced June 2017.
-
Complementing Model Learning with Mutation-Based Fuzzing
Authors:
Rick Smetsers,
Joshua Moerman,
Mark Janssen,
Sicco Verwer
Abstract:
An ongoing challenge for learning algorithms formulated in the Minimally Adequate Teacher framework is to efficiently obtain counterexamples. In this paper we compare and combine conformance testing and mutation-based fuzzing methods for obtaining counterexamples when learning finite state machine models for the reactive software systems of the Rigorous Exampination of Reactive Systems (RERS) chal…
▽ More
An ongoing challenge for learning algorithms formulated in the Minimally Adequate Teacher framework is to efficiently obtain counterexamples. In this paper we compare and combine conformance testing and mutation-based fuzzing methods for obtaining counterexamples when learning finite state machine models for the reactive software systems of the Rigorous Exampination of Reactive Systems (RERS) challenge. We have found that for the LTL problems of the challenge the fuzzer provided an independent confirmation that the learning process had been successful, since no additional counterexamples were found. For the reachability problems of the challenge, however, the fuzzer discovered more reachable error states than the learner and tester, albeit in some cases the learner and tester found some that were not discovered by the fuzzer. This leads us to believe that these orthogonal approaches are complementary in the context of model learning.
△ Less
Submitted 8 November, 2016;
originally announced November 2016.
-
Giant component sizes in scale-free networks with power-law degrees and cutoffs
Authors:
A. J. E. M. Janssen,
Johan S. H. van Leeuwaarden
Abstract:
Scale-free networks arise from power-law degree distributions. Due to the finite size of real-world networks, the power law inevitably has a cutoff at some maximum degree $Δ$. We investigate the relative size of the giant component $S$ in the large-network limit. We show that $S$ as a function of $Δ$ increases fast when $Δ$ is just large enough for the giant component to exist, but increases ever…
▽ More
Scale-free networks arise from power-law degree distributions. Due to the finite size of real-world networks, the power law inevitably has a cutoff at some maximum degree $Δ$. We investigate the relative size of the giant component $S$ in the large-network limit. We show that $S$ as a function of $Δ$ increases fast when $Δ$ is just large enough for the giant component to exist, but increases ever more slowly when $Δ$ increases further. This makes that while the degree distribution converges to a pure power law when $Δ\to\infty$, $S$ approaches its limiting value at a slow pace. The convergence rate also depends on the power-law exponent $τ$ of the degree distribution. The worst rate of convergence is found to be for the case $τ\approx2$, which concerns many of the real-world networks reported in the literature.
△ Less
Submitted 30 November, 2015;
originally announced November 2015.
-
Attention Dynamics in Collaborative Knowledge Creation
Authors:
Lingfei Wu,
Marco A. Janssen
Abstract:
To uncover the mechanisms underlying the collaborative production of knowledge, we investigate a very large online Question and Answer system that includes the question asking and answering activities of millions of users over five years. We created knowledge networks in which nodes are questions and edges are the successive answering activities of users. We find that these networks have two commo…
▽ More
To uncover the mechanisms underlying the collaborative production of knowledge, we investigate a very large online Question and Answer system that includes the question asking and answering activities of millions of users over five years. We created knowledge networks in which nodes are questions and edges are the successive answering activities of users. We find that these networks have two common properties: 1) the mitigation of degree inequality among nodes; and 2) the assortative mixing of nodes. This means that, while the system tends to reduce attention investment on old questions in order to supply sufficient attention to new questions, it is not easy for novel knowledge be integrated into the existing body of knowledge. We propose a mixing model to combine preferential attachment and reversed preferential attachment processes to model the evolution of knowledge networks and successfully reproduce the ob- served patterns. Our mixing model is not only theoretically interesting but also provide insights into the management of online communities.
△ Less
Submitted 24 November, 2015;
originally announced November 2015.
-
Taking a moment to measure Networks - A hierarchical approach
Authors:
Kehinde R. Salau,
Jacopo A. Baggio,
Marco A. Janssen,
Joshua K. Abbott,
Eli P. Fenichel
Abstract:
Network-theoretic tools contribute to understanding real-world system dynamics, e.g., in wildlife conservation, epidemics, and power outages. Network visualization helps illustrate structural heterogeneity; however, details about heterogeneity are lost when summarizing networks with a single mean-style measure. Researchers have indicated that a hierarchical system composed of multiple metrics may…
▽ More
Network-theoretic tools contribute to understanding real-world system dynamics, e.g., in wildlife conservation, epidemics, and power outages. Network visualization helps illustrate structural heterogeneity; however, details about heterogeneity are lost when summarizing networks with a single mean-style measure. Researchers have indicated that a hierarchical system composed of multiple metrics may be a more useful determinant of structure, but a formal method for grou** metrics is still lacking. We develop a hierarchy using the statistical concept of moments and systematically test the hypothesis that this system of metrics is sufficient to explain the variation in processes that take place on networks, using an ecological systems example. Results indicate that the moments approach outperforms single summary metrics and accounts for a majority of the variation in process outcomes. The hierarchical measurement scheme is helpful for indicating when additional structural information is needed to describe system process outcomes.
△ Less
Submitted 25 September, 2015;
originally announced September 2015.
-
The Role of Diverse Strategies in Sustainable Knowledge Production
Authors:
Lingfei Wu,
Jacopo A. Baggio,
Marco A. Janssen
Abstract:
Online communities are becoming increasingly important as platforms for large-scale human cooperation. These communities allow users seeking and sharing professional skills to solve problems collaboratively. To investigate how users cooperate to complete a large number of knowledge-producing tasks, we analyze StackExchange, one of the largest question and answer systems in the world. We construct…
▽ More
Online communities are becoming increasingly important as platforms for large-scale human cooperation. These communities allow users seeking and sharing professional skills to solve problems collaboratively. To investigate how users cooperate to complete a large number of knowledge-producing tasks, we analyze StackExchange, one of the largest question and answer systems in the world. We construct attention networks to model the growth of 110 communities in the StackExchange system and quantify individual answering strategies using the linking dynamics of attention networks. We identify two types of users taking different strategies. One strategy (type A) aims at performing maintenance by doing simple tasks, while the other strategy (type B) aims investing time in doing challenging tasks. We find that the number of type A needs to be twice as big as type B users for a sustainable growth of communities.
△ Less
Submitted 24 November, 2015; v1 submitted 16 September, 2015;
originally announced September 2015.
-
Adoption as a Social Marker: Innovation Diffusion with Outgroup Aversion
Authors:
Paul E. Smaldino,
Marco A. Janssen,
Vicken Hillis,
Jenna Bednar
Abstract:
Social identities are among the key factors driving behavior in complex societies. Signals of social identity are known to influence individual behaviors in the adoption of innovations. Yet the population-level consequences of identity signaling on the diffusion of innovations are largely unknown. Here we use both analytical and agent-based modeling to consider the spread of a beneficial innovatio…
▽ More
Social identities are among the key factors driving behavior in complex societies. Signals of social identity are known to influence individual behaviors in the adoption of innovations. Yet the population-level consequences of identity signaling on the diffusion of innovations are largely unknown. Here we use both analytical and agent-based modeling to consider the spread of a beneficial innovation in a structured population in which there exist two groups who are averse to being mistaken for each other. We investigate the dynamics of adoption and consider the role of structural factors such as demographic skew and communication scale on population-level outcomes. We find that outgroup aversion can lead to adoption being delayed or suppressed in one group, and that population-wide underadoption is common. Comparing the two models, we find that differential adoption can arise due to structural constraints on information flow even in the absence of intrinsic between-group differences in adoption rates. Further, we find that patterns of polarization in adoption at both local and global scales depend on the details of demographic organization and the scale of communication. This research has particular relevance to widely beneficial but identity-relevant products and behaviors, such as green technologies, where overall levels of adoption determine the positive benefits that accrue to society at large.
△ Less
Submitted 21 July, 2016; v1 submitted 16 July, 2015;
originally announced July 2015.
-
Invertible Orientation Scores of 3D Images
Authors:
Michiel Janssen,
Remco Duits,
Marcel Breeuwer
Abstract:
The enhancement and detection of elongated structures in noisy image data is relevant for many biomedical applications. To handle complex crossing structures in 2D images, 2D orientation scores were introduced, which already showed their use in a variety of applications. Here we extend this work to 3D orientation scores. First, we construct the orientation score from a given dataset, which is achi…
▽ More
The enhancement and detection of elongated structures in noisy image data is relevant for many biomedical applications. To handle complex crossing structures in 2D images, 2D orientation scores were introduced, which already showed their use in a variety of applications. Here we extend this work to 3D orientation scores. First, we construct the orientation score from a given dataset, which is achieved by an invertible coherent state type of transform. For this transformation we introduce 3D versions of the 2D cake-wavelets, which are complex wavelets that can simultaneously detect oriented structures and oriented edges. For efficient implementation of the different steps in the wavelet creation we use a spherical harmonic transform. Finally, we show some first results of practical applications of 3D orientation scores.
△ Less
Submitted 28 May, 2015;
originally announced May 2015.
-
60 GHz Wireless Link Within Metal Enclosures: Channel Measurements and System Analysis
Authors:
Seyran Khademi,
Sundeep Prabhakar Chepuri,
Zoubir Irahhauten,
Gerard J. M. Janssen,
Alle-Jan van der Veen
Abstract:
Wireless channel measurement results for 60 GHz within a closed metal cabinet are provided. A metal cabinet is chosen to emulate the environment within a mechatronic system, which have metal enclosures in general. A frequency domain sounding technique is used to measure the wireless channel for different volumes of the metal enclosure, considering both line-of-sight (LOS) and non-line-of-sight (NL…
▽ More
Wireless channel measurement results for 60 GHz within a closed metal cabinet are provided. A metal cabinet is chosen to emulate the environment within a mechatronic system, which have metal enclosures in general. A frequency domain sounding technique is used to measure the wireless channel for different volumes of the metal enclosure, considering both line-of-sight (LOS) and non-line-of-sight (NLOS) scenarios. Large-scale and small-scale characteristics of the wireless channel are extracted in order to build a comprehensive channel model. In contrast to conventional indoor channels at 60 GHz, the channel in the metal enclosure is highly reflective resulting in a rich scattering environment with a significantly large root-mean-square (RMS) delay spread. Based on the obtained measurement results, the bit error rate (BER) performance is evaluated for a wideband orthogonal frequency division multiplexing (OFDM) system.
△ Less
Submitted 18 November, 2013;
originally announced November 2013.
-
Optimal Tradeoff Between Exposed and Hidden Nodes in Large Wireless Networks
Authors:
P. M. van de Ven,
A. J. E. M. Janssen,
J. S. H. van Leeuwaarden
Abstract:
Wireless networks equipped with the CSMA protocol are subject to collisions due to interference. For a given interference range we investigate the tradeoff between collisions (hidden nodes) and unused capacity (exposed nodes). We show that the sensing range that maximizes throughput critically depends on the activation rate of nodes. For infinite line networks, we prove the existence of a threshol…
▽ More
Wireless networks equipped with the CSMA protocol are subject to collisions due to interference. For a given interference range we investigate the tradeoff between collisions (hidden nodes) and unused capacity (exposed nodes). We show that the sensing range that maximizes throughput critically depends on the activation rate of nodes. For infinite line networks, we prove the existence of a threshold: When the activation rate is below this threshold the optimal sensing range is small (to maximize spatial reuse). When the activation rate is above the threshold the optimal sensing range is just large enough to preclude all collisions. Simulations suggest that this threshold policy extends to more complex linear and non-linear topologies.
△ Less
Submitted 7 April, 2010;
originally announced April 2010.
-
Spatial fairness in linear wireless multi-access networks
Authors:
P. M. van de Ven,
J. S. H. van Leeuwaarden,
D. Denteneer,
A. J. E. M. Janssen
Abstract:
Multi-access networks may exhibit severe unfairness in throughput. Recent studies show that this unfairness is due to local differences in the neighborhood structure: Nodes with less neighbors receive better access. We study the unfairness in saturated linear networks, and adapt the multi-access CSMA protocol to remove the unfairness completely, by choosing the activation rates of nodes appropriat…
▽ More
Multi-access networks may exhibit severe unfairness in throughput. Recent studies show that this unfairness is due to local differences in the neighborhood structure: Nodes with less neighbors receive better access. We study the unfairness in saturated linear networks, and adapt the multi-access CSMA protocol to remove the unfairness completely, by choosing the activation rates of nodes appropriately as a function of the number of neighbors. We then investigate the consequences of this choice of activation rates on the network-average saturated throughput, and we show that these rates perform well in a non-saturated setting.
△ Less
Submitted 7 April, 2010;
originally announced April 2010.